IS

Posey, Clay

Topic Weight Topic Terms
0.557 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals
0.125 security threat information users detection coping configuration avoidance response firm malicious attack intrusion appraisal countermeasures
0.117 systems information objectives organization organizational development variety needs need efforts technical organizations developing suggest given
0.111 modeling models model business research paradigm components using representation extension logical set existing way aspects
0.102 commitment need practitioners studies potential role consider difficult models result importance influence researchers established conduct

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Lowry, Paul Benjamin 2 Bennett, Rebecca J. 1 Courtney, James F. 1 Roberts, Tom L. 1
Roberts, Tom L 1
Protection-motivated behaviors 2 Behavioral information security 1 coping appraisal information security 1 multidimensional scaling 1
MIMIC model 1 organizational commitment 1 protection motivation theory 1 security 1
structural equation modeling 1 theory of diversity 1 threat appraisal 1

Articles (2)

The Impact of Organizational Commitment on Insiders Motivation to Protect Organizational Information Assets (Journal of Management Information Systems, 2015)
Authors: Abstract:
    Insiders may act to sustain and improve organizational information security, yet our knowledge of what motivates them to do so remains limited. For example, most extant research relies on mere portions of protection motivation theory (PMT) and has focused on isolated behaviors, thus limiting the generalizability of findings to isolated issues, rather than addressing the global set of protective security behaviors. Here, we investigate the motivations surrounding this larger behavioral set by assessing maladaptive rewards, response costs, and fear alongside traditional PMT components. We extend PMT by showing that: (1) security education, training, and awareness (SETA) efforts help form appraisals; (2) PMT's applicability to organizational rather than personal contexts depends on insiders' organizational commitment levels; and (3) response costs provide the link between PMT's appraisals. We show in detail how organizational commitment is the mechanism through which organizational security threats become personally relevant to insiders and how SETA efforts influence many PMT-based components. > >
INSIDERS' PROTECTION OF ORGANIZATIONAL INFORMATION ASSETS: DEVELOPMENT OF A SYSTEMATICS-BASED TAXONOMY AND THEORY OF DIVERSITY FOR PROTECTION-MOTIVATED BEHAVIORS. (MIS Quarterly, 2013)
Authors: Abstract:
    Protecting information from a variety of security threats is a daunting organizational activity. Organization managers must recognize the roles that organization insiders have in protecting information resources rather than solely relying upon technology to provide this protection. Unfortunately, compared to negative insider behaviors, the extant literature provides sparse coverage of beneficial insider activities. The few beneficial activities in the literature represent only a small portion of the diverse collection of insiders' protective actions. This research focuses on protection-motivated behaviors (PMBs), which are volitional behaviors enacted by organization insiders to protect (1) organizationally relevant information and (2) the computer-based information systems in which the information is stored, collected, disseminated, and/or manipulated from information security threats. Based on systematics, we propose a six-step methodology of qualitative and quantitative approaches to develop a taxonomy and theory of diversity for PMBs. These approaches integrate the classification techniques of multidimensional scaling (MDS), property fitting (ProFit), and cluster analyses. We leverage these techniques to identify and display how insiders collectively classify 67 unique PMBs and their homogeneous classes. Our taxonomy provides researchers and practitioners a comprehensive guide and common nomenclature for PMBs. Our methodology can be similarly used to create other theories of diversity.